Implicit certificate key generation method based on SM2 digital signature

An implicit certificate and digital signature technology, applied in the field of information security, can solve the problems of receiver decryption failure, input error of identity information, and speed up the generation of user's public key, so as to reduce communication overhead, speed up verification, and avoid certificate errors. Binding attack effect

Active Publication Date: 2021-02-12
XIDIAN UNIV
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the problem with IBC itself is that although the identity is a meaningful string, if the identity information is entered incorrectly during encryption, it may also cause the receiver to fail to decrypt
However, the ECQV implicit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implicit certificate key generation method based on SM2 digital signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] refer to figure 1 , the implementation steps of the present invention are as follows:

[0035] Step 1, system parameter initialization.

[0036] The system parameters of this example are set according to the domestic cryptographic algorithm SM2 standard recognized by the State Cryptography Administration, and the settings are as follows:

[0037] 1.1) Let F q is a finite field of order q, where q is an odd prime number or a power of 2, when q is an odd prime number p, p>2 is required 191 ; when q is a power of 2 m When , require m>192 and be a prime number;

[0038] 1.2) Select the elliptic curve equation E as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an SM2 digital signature-based implicit certificate key generation method, which mainly solves the problem that a user identity cannot correspond to a user public key in a public key cryptosystem in the prior art. According to the scheme, system parameters are set and initialized according to a standard cryptographic algorithm SM2; the certificate authority CA generates a key pair and sends a public key PCA to a user usr applying for a certificate; the user applying for the certificate generates a temporary key pair and sends an identity identifier IDA and a temporary public key X of the user to a certificate authority CA; the CA generates an implicit certificate cert and a signature s, and sends the cert and s to a user applying for the certificate; and the user generates a complete public key U and then verifies the complete public key U and the signature s to obtain a complete public and private key pair (u, U). The method conforms to the national cryptographic SM2 signature algorithm standard, is high in operation efficiency and short in bandwidth overhead, reduces the risk that a man-in-the-middle replaces a public key, and can be used for a resource-limited Internet of Things environment.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an implicit certificate key generation method, which can be used in an Internet of Things environment with limited resources, unifies the relationship between user identity and user public key, and realizes public key authentication. Background technique [0002] In the public key cryptography system, a user has two keys, public key and private key. Among them, the public key is open to anyone. Anyone who obtains the public key can use the public key to encrypt the message. The encrypted ciphertext can then be sent to the recipient through an open channel. Only the recipient who has the private key corresponding to the public key can correctly decrypt the ciphertext and recover the plaintext information. Typical public key encryption systems include RSA system, ELGamal system, and Gramer-Shoup system with high security. [0003] A key problem with this ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/0861H04L9/0869H04L9/3066H04L9/3236H04L9/3239H04L9/3242H04L9/3247H04L9/3249H04L9/3263H04L9/3268
Inventor 姜奇刘强赵贵川马建峰马卓张俊伟杨超马鑫迪李兴华杨力
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products